Analysis
-
max time kernel
132s -
max time network
141s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
16-05-2021 05:59
Static task
static1
Behavioral task
behavioral1
Sample
3e66c17ed85f736d462323f0042cf3faab1940d89f4d42c08f1b5fe1110f1e31.exe
Resource
win7v20210410
windows7_x64
0 signatures
0 seconds
General
-
Target
3e66c17ed85f736d462323f0042cf3faab1940d89f4d42c08f1b5fe1110f1e31.exe
-
Size
149KB
-
MD5
3cf01a251d7fc7c63e25ab4b9dda0a14
-
SHA1
856e45a3cd293aa1671434ce92b8c97e802d7983
-
SHA256
3e66c17ed85f736d462323f0042cf3faab1940d89f4d42c08f1b5fe1110f1e31
-
SHA512
f0c7954280fd12f53f3e28f593e392ad38a85b6f42be86d4062b89b9d7513ba005ff180c959cca7965e480a2280fc12d33909cb77b719ba7c9f270a72fdac310
Malware Config
Signatures
-
Drops file in System32 directory 5 IoCs
Processes:
ipropmheg.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 ipropmheg.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE ipropmheg.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies ipropmheg.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 ipropmheg.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat ipropmheg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 3 IoCs
Processes:
ipropmheg.exedescription ioc process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix ipropmheg.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" ipropmheg.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" ipropmheg.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
ipropmheg.exepid process 1092 ipropmheg.exe 1092 ipropmheg.exe 1092 ipropmheg.exe 1092 ipropmheg.exe 1092 ipropmheg.exe 1092 ipropmheg.exe 1092 ipropmheg.exe 1092 ipropmheg.exe 1092 ipropmheg.exe 1092 ipropmheg.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
3e66c17ed85f736d462323f0042cf3faab1940d89f4d42c08f1b5fe1110f1e31.exepid process 2836 3e66c17ed85f736d462323f0042cf3faab1940d89f4d42c08f1b5fe1110f1e31.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
3e66c17ed85f736d462323f0042cf3faab1940d89f4d42c08f1b5fe1110f1e31.exeipropmheg.exedescription pid process target process PID 3904 wrote to memory of 2836 3904 3e66c17ed85f736d462323f0042cf3faab1940d89f4d42c08f1b5fe1110f1e31.exe 3e66c17ed85f736d462323f0042cf3faab1940d89f4d42c08f1b5fe1110f1e31.exe PID 3904 wrote to memory of 2836 3904 3e66c17ed85f736d462323f0042cf3faab1940d89f4d42c08f1b5fe1110f1e31.exe 3e66c17ed85f736d462323f0042cf3faab1940d89f4d42c08f1b5fe1110f1e31.exe PID 3904 wrote to memory of 2836 3904 3e66c17ed85f736d462323f0042cf3faab1940d89f4d42c08f1b5fe1110f1e31.exe 3e66c17ed85f736d462323f0042cf3faab1940d89f4d42c08f1b5fe1110f1e31.exe PID 3292 wrote to memory of 1092 3292 ipropmheg.exe ipropmheg.exe PID 3292 wrote to memory of 1092 3292 ipropmheg.exe ipropmheg.exe PID 3292 wrote to memory of 1092 3292 ipropmheg.exe ipropmheg.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3e66c17ed85f736d462323f0042cf3faab1940d89f4d42c08f1b5fe1110f1e31.exe"C:\Users\Admin\AppData\Local\Temp\3e66c17ed85f736d462323f0042cf3faab1940d89f4d42c08f1b5fe1110f1e31.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3904 -
C:\Users\Admin\AppData\Local\Temp\3e66c17ed85f736d462323f0042cf3faab1940d89f4d42c08f1b5fe1110f1e31.exe--cc92c712⤵
- Suspicious behavior: RenamesItself
PID:2836
-
-
C:\Windows\SysWOW64\ipropmheg.exe"C:\Windows\SysWOW64\ipropmheg.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3292 -
C:\Windows\SysWOW64\ipropmheg.exe--bf82c5df2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:1092
-